ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-32CB3540BF82
Infrastructure Scan ADDRESS: 0xdf150056f6ae83d415ff5e0874f23c0d973eff00 DEPLOYED: 2026-05-06 10:10:35 LAST_TX: 2026-05-06 10:30:59 |
Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover VISIBILITY: OWNERSHIP_LEAK_DETECTED |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Requesting storage slots for offset 0x00… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Program Counter (PC) synchronized at 6321. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘0E48C0DA’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6d526d23bd09a807e5edb4d5faa0ed64065acbc8 0x497ca1cf92c8ace083f1b2f42bc32ae1910f0b94 0xdbfd93b6b4ca3fa11d28abbeed91ebe5ebc74bd9 0x4aa78c9bbc99bcfc7fb6b99c943cba48119ed72b 0x80ef7a6098f453ccec574d0c396e8a09c3b5d436 0x22d3318a940aed42017ded1acc8a6ed0865375e5 0xb1724153febe160c1da1c338e74405e695daccac 0xf18d8ba0a4ce107ed7ab718cbe739a27c72aed10 0x1e81b48dc8cc83ab04e93d0794e7c74e70added9 0x762ab4091ef74483796618d264a6c2819747fc78 0xbe5a3d003320762e4a45141e8cd2538ef04af78e 0x03689d6608300e1885fb1bf866b4d136eb27d77c 0x1d87534b54ab41c7c3b30a99609af434da75ef39 0xd69aea4b95eeaacca25926e2b8c632d3f7db207e 0x31191e7a97268a2b7532a7e1f6114f3f5dfd665d 0x7c1aae6860c337442469b8dbe5f6ca47ed96f256 0x005434b394121502e80d7e0239648e12d98f9351 0x42e43591e6935b774154603237b26c033936f140 0xb0957514af22aad2a81c3586ea9eac280e423a13 0xa1d771a9874d3396a15bcf67421ab3b52df8b630